Fig. 1. Transition and Forecast of Global Surveillance Camera Market Size
Fig. 2. Site Listing IP Cameras that were hacked
Fig. 3. Homepage of Shodan
Fig. 4. Example of Aircrack-ng Tool
Fig. 5. Example of Hydra Tool
Fig. 6. Result of Retrieval using contry:KR Filter
Fig. 7. Access to Domestic IP Camera without Authentication
Fig. 8. Finding Parameter Information using Development Tools
Fig. 9. Cracking Password using Hydra Tool
Table 1. Filters used in Shodan
Table 2. Cracking result after setting Default Password
Table 3. Cracking Result after setting Safe Password
References
- Jeon Young Sung, Han Jong Wook, Cho Hyun Sook, "Technology Trend of Next Generation Video Security", REVIEW OF KIISC, 20(3), pp. 9-17, 2010.
- Hong Soon Ho, "IP Camera Market and Trend in the Video Security Industry", REVIEW OF KIISC, Vol. 20, No. 3, pp. 18-23, 2010.
- J. Y. Park, C. H. Song, S. Y. Kim, J. H. Park, J. H. Park, "IP Camera Authentication and Key Exchange Protocol Using ID-Based Signature Scheme", Journal of the Korea Institute of Information Security & Cryptology, 28(4), pp. 789-801, 2018. https://doi.org/10.13089/JKIISC.2018.28.4.789
- S. D. Yoo, D. H. Ryu, "A study on the Promotion Method of Domestic Video Security Industry", The Journal of The Institute of Internet, Broadcasting and Communication, Vol. 17, No. 3, pp. 9-21, 2017. https://doi.org/10.7236/JIIBC.2017.17.3.9
- Tae Woong Seo, Sung Ryoul Lee, Byung Chul Bae, E-Joong Yoon, Chang Soo Kim, "An Analysis of Vulnerabilities and Performance on the CCTV Security Monitoring and Control", Journal of Korea Multimedia Society, 15(1), pp. 93-100, 2012. https://doi.org/10.9717/kmms.2012.15.1.093
- Kim Yun Ha, Yun Seong Won, Kim Jin Hun, OH EUN, Choi Hun Ju, "The Case Study on Security Reinforcement and Network Management Improvement using Vulnerability Analysis of Transmission Section for IP Camera", Proceedings of Symposium of the Korean Institute of Communications and Information Sciences, pp. 759-760, 2018.
- Jin Young Park, Chi-ho Song, Suk-young Kim, Ju-hyun Park, Jong Hwan Park, "IP Camera Authentication and Key Exchange Protocol Using ID-Based Signature Scheme", Journal of The Korea Institute of Information Security & Cryptology, 28(4), pp. 789-801, 2018. https://doi.org/10.13089/JKIISC.2018.28.4.789
- K. Y. Kim, K. S. Lee, B. S. Kim, "Protection Motivation of IP Camera Users: A Mixed Methods Approach", The e-Business Studies, 19(10, pp. 227-245, 2018.
- DongHyuk Lee, Namje Park, "A Study on Security Authentication and Security Management Method for IoT Products", The Journal of The Korean Institute of Communication Sciences, 33(12), pp. 28-34, 2016.
- Ministry of Science and ICT, Korea Communications Commission, National Police Agency, "Comprehensive Countermeasures for IP Cameras", 2017.
- MiHui Kim, "Privacy Protection Technologies on IoT Environments : Case Study of Networked Cameras", Journal of THE KOREA CONTENTS ASSOCIATION, 16(9), pp. 329-338, 2016. https://doi.org/10.5392/JKCA.2016.16.09.329
- Sang-hoon Han, Kyo-Rim Koo, Han-Sol Park, Hyun-Tae Kim, Do-Yong Song, "A Security Analysis by Cracking in Wireless Routers", Proceedings of the Korean Society of Computer Information Conference, 25(2), pp. 400-401, 2017.
- Sang-Hoon Han, Jin-Hui Jang,Gil-Uk Kang, Han-Sol Park, "IP Camera Hacking Analysis And Measure", Proceedings of The Korean Society of Computer Information Conference, 26(1), pp. 165-166, 2018.
- Ishwadeep Badgujar, "How to Hack CCTV Private Cameras", https://null-byte.wonderhowto.com/forum/hack-cctv-private-cameras-0159437
- Hydra tool, http://tylerrockwell.github.io/defeating-basic-auth-with-hydra/
- Andy O'Donnell, "How to Secure Your IP Security Cameras", https://www.lifewire.com/secure-your-ipsecurity-cameras-2487488